default search action
Kaoutar Elkhiyaoui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i17]Yacov Manevich, Hagar Meir, Kaoutar Elkhiyaoui, Yoav Tock, May Buzaglo:
Arma: Byzantine Fault Tolerant Consensus with Horizontal Scalability. CoRR abs/2405.16575 (2024) - [i16]Yacov Manevich, Hagar Meir, Kaoutar Elkhiyaoui, Yoav Tock, May Buzaglo:
Arma: Byzantine Fault Tolerant Consensus with Horizontal Scalability. IACR Cryptol. ePrint Arch. 2024: 808 (2024) - 2023
- [j2]Dimitrios Vasilopoulos, Melek Önen, Refik Molva, Kaoutar Elkhiyaoui:
Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†. Secur. Priv. 6(5) (2023) - [c24]Francesca Falzon, Kaoutar Elkhiyaoui, Yacov Manevich, Angelo De Caro:
Short Privacy-Preserving Proofs of Liabilities. CCS 2023: 1805-1819 - [i15]Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich:
DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing. IACR Cryptol. ePrint Arch. 2023: 1177 (2023) - [i14]Elli Androulaki, Marcus Brandenburger, Angelo De Caro, Kaoutar Elkhiyaoui, Liran Funaro, Alexandros Filios, Yacov Manevich, Senthilnathan Natarajan, Manish Sethi:
A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies. IACR Cryptol. ePrint Arch. 2023: 1717 (2023) - 2022
- [c23]Jonathan Bootle, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich:
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing. ESORICS (2) 2022: 427-446 - 2021
- [c22]Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. CANS 2021: 435-459 - [i13]Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki:
Multi-Issuer Anonymous Credentials Without a Root Authority. IACR Cryptol. ePrint Arch. 2021: 1669 (2021) - 2020
- [c21]Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. AFT 2020: 255-267 - [c20]Shengjiao Cao, Yuan Yuan, Angelo De Caro, Karthik Nandakumar, Kaoutar Elkhiyaoui, Yanyan Hu:
Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems. Financial Cryptography 2020: 137-155 - [i12]Elli Androulaki, Angelo De Caro, Kaoutar Elkhiyaoui, Christian Gorenflo, Alessandro Sorniotti, Marko Vukolic:
Multi-Shard Private Transactions for Permissioned Blockchains. CoRR abs/2010.08274 (2020)
2010 – 2019
- 2019
- [i11]Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. IACR Cryptol. ePrint Arch. 2019: 1058 (2019) - [i10]Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. IACR Cryptol. ePrint Arch. 2019: 1097 (2019) - 2018
- [c19]Dimitrios Vasilopoulos, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen:
POROS: Proof of Data Reliability for Outsourced Storage. SCC@AsiaCCS 2018: 27-37 - 2016
- [c18]Dimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, Refik Molva:
Message-Locked Proofs of Retrievability with Secure Deduplication. CCSW 2016: 73-83 - [c17]Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva:
Efficient Techniques for Publicly Verifiable Delegation of Computation. AsiaCCS 2016: 119-128 - 2015
- [c16]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. CANS 2015: 3-18 - [c15]Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Publicly verifiable conjunctive keyword search in outsourced databases. CNS 2015: 619-627 - [i9]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. IACR Cryptol. ePrint Arch. 2015: 562 (2015) - [i8]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Online-Offline Homomorphic Signatures for Polynomial Functions. IACR Cryptol. ePrint Arch. 2015: 954 (2015) - 2014
- [c14]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva:
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. CANS 2014: 305-320 - [c13]Walid Benghabrit, Hervé Grall, Jean-Claude Royer, Mohamed Sellami, Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Anderson Santana de Oliveira, Karin Bernsmed:
From Regulatory Obligations to Enforceable Accountability Policies in the Cloud. CLOSER (Selected Papers) 2014: 134-150 - [c12]Walid Benghabrit, Hervé Grall, Jean-Claude Royer, Mohamed Sellami, Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Anderson Santana de Oliveira, Karin Bernsmed:
A Cloud Accountability Policy Representation Framework. CLOSER 2014: 489-498 - [c11]Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen:
StealthGuard: Proofs of Retrievability with Hidden Watchdogs. ESORICS (1) 2014: 239-256 - [c10]Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Karin Bernsmed, Anderson Santana de Oliveira, Jakub Sendor:
A-PPL: An Accountability Policy Language. DPM/SETOP/QASA 2014: 319-326 - [c9]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Privacy Preserving Delegated Word Search in the Cloud. SECRYPT 2014: 137-150 - [i7]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva:
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. IACR Cryptol. ePrint Arch. 2014: 256 (2014) - [i6]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Privacy preserving delegated word search in the cloud. IACR Cryptol. ePrint Arch. 2014: 509 (2014) - 2012
- [b1]Kaoutar Elkhiyaoui:
Security and privacy in RFID systems. (Sécurité et protection de la vie privée dans les systèmes RFID). Télécom ParisTech, France, 2012 - [c8]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags. RFIDSec 2012: 76-95 - [c7]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: on-site checking in RFID-based supply chains. WISEC 2012: 173-184 - [c6]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
PPS: Privacy-preserving statistics using RFID tags. WOWMOM 2012: 1-6 - [i5]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags. IACR Cryptol. ePrint Arch. 2012: 465 (2012) - 2011
- [j1]Daishi Kato, Kaoutar Elkhiyaoui, Kazuo Kunieda, Keiji Yamada, Pietro Michiardi:
A scalable interest-oriented peer-to-peer pub/sub network. Peer-to-Peer Netw. Appl. 4(2): 165-177 (2011) - [c5]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Olivier Savry, Cédric Vérhilac:
Demo: the ff hardware prototype for privacy-preserving RFID authentication. CCS 2011: 737-740 - [c4]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. NDSS 2011 - [c3]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
ROTIV: RFID Ownership Transfer with Issuer Verification. RFIDSec 2011: 163-182 - [i4]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: On-site checking in RFID-based supply chains. IACR Cryptol. ePrint Arch. 2011: 651 (2011) - 2010
- [i3]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. IACR Cryptol. ePrint Arch. 2010: 219 (2010) - [i2]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
ROTIV: RFID Ownership Transfer with Issuer Verification. IACR Cryptol. ePrint Arch. 2010: 634 (2010)
2000 – 2009
- 2009
- [c2]Olivier Billet, Kaoutar Elkhiyaoui:
Two Attacks against the Ff RFID Protocol. INDOCRYPT 2009: 308-320 - [c1]Kaoutar Elkhiyaoui, Daishi Kato, Kazuo Kunieda, Keiji Yamada, Pietro Michiardi:
A Scalable Interest-oriented Peer-to-Peer Pub/Sub Network. Peer-to-Peer Computing 2009: 204-211 - [i1]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
PPS: Privacy Preserving Statistics using RFID Tags. IACR Cryptol. ePrint Arch. 2009: 481 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-02 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint